Security issues in distributed data storage & its solutions
Privacy is mandatory to prevent unapproved clients from contact with the sensitive data as it is subject to illicit disclose and access once it outsourced. Genuineness can keep outsourced data from being returned and altered. The Distributed reckoning is the latest innovation which gives distinctive...
Saved in:
| Published in | ICCPEIC : 2017 International Conference on Computation of Power, Energy Information and Commuincation : 22-23 March 2017 pp. 149 - 152 |
|---|---|
| Main Authors | , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.03.2017
|
| Subjects | |
| Online Access | Get full text |
| DOI | 10.1109/ICCPEIC.2017.8290356 |
Cover
| Abstract | Privacy is mandatory to prevent unapproved clients from contact with the sensitive data as it is subject to illicit disclose and access once it outsourced. Genuineness can keep outsourced data from being returned and altered. The Distributed reckoning is the latest innovation which gives distinctive robust free administrations through the web. The virtual cloud server permits the client to store their information on the cloud without stressing over accuracy & integrity of the data. The distributed data storage has numerous benefits over local data storage. The user can upload data to the cloud and get those data at anytime and anywhere with no extra burden. The User doesn't need to stress over storage and maintenance of cloud data. In any case, as the data are put in the remote place how users will get the affirmation about stored information. Subsequently, distributed storage ought to have some system which will determine storage correctness and trustworthiness of data stored on a cloud. The main issue of distributed storage is security. Numerous scientists have proposed their work or new encryption algorithms to accomplish security or to resolve this security issue. The proposed encryption scheme leverages to build a secure data storage to significantly improve the security. |
|---|---|
| AbstractList | Privacy is mandatory to prevent unapproved clients from contact with the sensitive data as it is subject to illicit disclose and access once it outsourced. Genuineness can keep outsourced data from being returned and altered. The Distributed reckoning is the latest innovation which gives distinctive robust free administrations through the web. The virtual cloud server permits the client to store their information on the cloud without stressing over accuracy & integrity of the data. The distributed data storage has numerous benefits over local data storage. The user can upload data to the cloud and get those data at anytime and anywhere with no extra burden. The User doesn't need to stress over storage and maintenance of cloud data. In any case, as the data are put in the remote place how users will get the affirmation about stored information. Subsequently, distributed storage ought to have some system which will determine storage correctness and trustworthiness of data stored on a cloud. The main issue of distributed storage is security. Numerous scientists have proposed their work or new encryption algorithms to accomplish security or to resolve this security issue. The proposed encryption scheme leverages to build a secure data storage to significantly improve the security. |
| Author | Punitha, A. Amali Angel Indumathi, G. |
| Author_xml | – sequence: 1 givenname: A. Amali Angel surname: Punitha fullname: Punitha, A. Amali Angel organization: Dept of CSE, ULTRA College of Engg & Tech for Women, Madurai, India – sequence: 2 givenname: G. surname: Indumathi fullname: Indumathi, G. organization: Dept of ECE, Mepco Schlenk Engg College, Sivakasi, India |
| BookMark | eNotz0FLwzAYgOEICursL9BDTt5avyRNk-BJyqaFgYPpeaTNF4nMVvqlh_17D-703h54b9nlOI3I2IOASghwT13b7tZdW0kQprLSgdLNBSucsUKDg1rJ2l6zgugbAIRrbO30DXve47DMKZ94IlqQeBp5SJTn1C8ZAw8-e055mv0X8keeMnGajktO00h37Cr6I2Fx7op9btYf7Vu5fX_t2pdtmYTRudSiiShCozE21gjvnFbS9sYHqaLXgxlqI10U2npbSwlG-eBtj6CViTgotWL3_25CxMPvnH78fDqcF9Ufj9JJCw |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICCPEIC.2017.8290356 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 9781509043248 1509043241 |
| EndPage | 152 |
| ExternalDocumentID | 8290356 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ABLEC ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK OCL RIE RIL |
| ID | FETCH-LOGICAL-i175t-516fe1d65ef6871a995328b7ad23fa5c7c4729f158a8422073ada8be0537fec33 |
| IEDL.DBID | RIE |
| IngestDate | Wed Aug 27 02:51:40 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i175t-516fe1d65ef6871a995328b7ad23fa5c7c4729f158a8422073ada8be0537fec33 |
| PageCount | 4 |
| ParticipantIDs | ieee_primary_8290356 |
| PublicationCentury | 2000 |
| PublicationDate | 2017-March |
| PublicationDateYYYYMMDD | 2017-03-01 |
| PublicationDate_xml | – month: 03 year: 2017 text: 2017-March |
| PublicationDecade | 2010 |
| PublicationTitle | ICCPEIC : 2017 International Conference on Computation of Power, Energy Information and Commuincation : 22-23 March 2017 |
| PublicationTitleAbbrev | ICCPEIC |
| PublicationYear | 2017 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0001968495 |
| Score | 1.6294615 |
| Snippet | Privacy is mandatory to prevent unapproved clients from contact with the sensitive data as it is subject to illicit disclose and access once it outsourced.... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 149 |
| SubjectTerms | Atomicity Cloud Application programming interface (API) Cloud computing Consistency Distributed databases Encoding Encryption Isolation and Durability (ACID) Memory Secure Hash Algorithm(SHA-1) Service level agreement (SLA) |
| Title | Security issues in distributed data storage & its solutions |
| URI | https://ieeexplore.ieee.org/document/8290356 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH9sO-nFj038JgfxZLs1bdIEj8WxCZOBDnYbafICQ-jEdRf_epO2bioevIWQkvLS9r0mvw-AG1fhM8ZzGVA3Ikg0ykBxjQG1kcwlDvK0AmNOnvholjzO2bwFd1suDCJW4DMMfbM6yzcrvfFbZX1_6Bcz3oZ2KnjN1drtp0guXLHfsOOigeyPs2z6MM48fCsNm0t_eKhUKWR4AJOvyWvkyGu4KfNQf_zSZfzv3R1Cb0fWI9NtGjqCFhbHsP9NZ7AL98-NSx2pwrwmy4IYr5jrza7QEA8TJR4m6T4u5JYsyzXZPpI9mA0fXrJR0LgmBEtXCpQBi7jFyHCGlru_ISUli6nIU2VobBXTqU5cQW0jJpRIKHWvuDJK5N4iIrWo4_gEOsWqwFMgxqvzcW2l8C7pBj2JlVmrYptGdkDlGXR9GBZvtTDGoonA-d_dF7Dnl6IGcF1Cp3zf4JXL6GV-XS3lJwnGoHw |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFH9BPKgXP8D4bQ_Gkxvso90ajwsEFAiJkHAjXfuaEJNhZFz86223CWo8eGuaLl1et7239vcBcGcqfEpZyh3fjHBCidwRTKLja4-nHNtpVIAxhyPWm4ZPMzqrwcOGC4OIBfgMXdsszvLVUq7tVlnLHvoFlO3ALg3DkJZsre2OCmexKfcrfpzX5q1-kow7_cQCuCK3uviHi0qRRLqHMPyavsSOvLrrPHXlxy9lxv_e3xE0t3Q9Mt4komOoYXYCB9-UBhvw-FL51JEi0CuyyIiymrnW7goVsUBRYoGS5vNC7skiX5HNQ9mEabczSXpO5ZvgLEwxkDvUYxo9xShqZv6HBOc08OM0EsoPtKAykqEpqbVHYxGHvm9ecqFEnFqTiEijDIJTqGfLDM-AKKvPx6TmsfVJV2hprFRrEejI022fn0PDhmH-VkpjzKsIXPzdfQt7vclwMB_0R8-XsG-XpYRzXUE9f1_jtcnveXpTLOsno6CjyQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=ICCPEIC+%3A+2017+International+Conference+on+Computation+of+Power%2C+Energy+Information+and+Commuincation+%3A+22-23+March+2017&rft.atitle=Security+issues+in+distributed+data+storage+%26+its+solutions&rft.au=Punitha%2C+A.+Amali+Angel&rft.au=Indumathi%2C+G.&rft.date=2017-03-01&rft.pub=IEEE&rft.spage=149&rft.epage=152&rft_id=info:doi/10.1109%2FICCPEIC.2017.8290356&rft.externalDocID=8290356 |